Full Text Documents

30

Search

Chargement de la page

Table of Contents
Data and Applications Security and Privacy XXXI
Giovanni Livraga, Sencun Zhu
Front Matter

Access Control


Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases
Yossif Shalabi, Ehud Gudes
3-19
Resilient Reference Monitor for Distributed Access Control via Moving Target Defense
Dieudonné Mulamba, Indrajit Ray
20-40
Preventing Unauthorized Data Flows
Emre Uzun, Gennaro Parlato, Vijayalakshmi Atluri, Anna Ferrara, Jaideep Vaidya, Shamik Sural, David Lorenzi
41-62
Object-Tagged RBAC Model for the Hadoop Ecosystem
Maanak Gupta, Farhan Patwa, Ravi Sandhu
63-81
Identification of Access Control Policy Sentences from Natural Language Policy Documents
Masoud Narouei, Hamed Khanpour, Hassan Takabi
82-100
Fast Distributed Evaluation of Stateful Attribute-Based Access Control Policies
Thang Bui, Scott Stoller, Shikhar Sharma
101-119

Privacy


Gaussian Mixture Models for Classification and Hypothesis Tests Under Differential Privacy
Xiaosu Tong, Bowei Xi, Murat Kantarcioglu, Ali Inan
123-141
Differentially Private K-Skyband Query Answering Through Adaptive Spatial Decomposition
Ling Chen, Ting Yu, Rada Chirkova
142-163
Mutually Private Location Proximity Detection with Access Control
Michael Solomon, Vaidy Sunderam, Li Xiong, Ming Li
164-184
Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery
Jun Zhang, Meiqi He, Siu-Ming Yiu
185-204
Privacy-Preserving Community-Aware Trending Topic Detection in Online Social Media
Theodore Georgiou, Amr El Abbadi, Xifeng Yan
205-224
Privacy-Preserving Outlier Detection for Data Streams
Jonas Böhler, Daniel Bernau, Florian Kerschbaum
225-238
Undoing of Privacy Policies on Facebook
Vishwas Patil, R. Shyamasundar
239-255

Cloud Security


Towards Actionable Mission Impact Assessment in the Context of Cloud Computing
Xiaoyan Sun, Anoop Singhal, Peng Liu
259-274
Reducing Security Risks of Clouds Through Virtual Machine Placement
Jin Han, Wanyu Zang, Songqing Chen, Meng Yu
275-292
Firewall Policies Provisioning Through SDN in the Cloud
Nora Cuppens, Salaheddine Zerkane, Yanhuang Li, David Espes, Philippe Parc, Frédéric Cuppens
293-310
Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations
Bo Zhang, Boxiang Dong, Wendy Wang
311-324
Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases
Florian Kerschbaum, Martin Härterich
325-336
Efficient Protocols for Private Database Queries
Tushar Saha, . Mayank, Takeshi Koshiba
337-348
Toward Group-Based User-Attribute Policies in Azure-Like Access Control Systems
Anna Ferrara, Anna Squicciarini, Cong Liao, Truc Nguyen
349-361

Secure Storage in the Cloud


High-Speed High-Security Public Key Encryption with Keyword Search
Rouzbeh Behnia, Attila Yavuz, Muslum Ozmen
365-385
HardIDX: Practical and Secure Index with SGX
Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi, Benny Fuhry, Raad Bahmani
386-408
A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction
Sebastian Messmer, Jochen Rill, Dirk Achenbach, Jörn Müller-Quade
409-429

Secure Systems


Keylogger Detection Using a Decoy Keyboard
Seth Simms, Margot Maxwell, Sara Johnson, Julian Rrushi
433-452
The Fallout of Key Compromise in a Proxy-Mediated Key Agreement Protocol
David Nuñez, Isaac Agudo, Javier Lopez
453-472
Improving Resilience of Behaviometric Based Continuous Authentication with Multiple Accelerometers
Tim Hamme, Davy Preuveneers, Wouter Joosen
473-485

Security in Networks and Web


A Content-Aware Trust Index for Online Review Spam Detection
Hao Xue, Fengjun Li
489-508
Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options
Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal
509-528
A Distributed Mechanism to Protect Against DDoS Attacks
Negar Mosharraf, Anura Jayasumana, Indrakshi Ray
529-540
Securing Web Applications with Predicate Access Control
Zhaomo Yang, Kirill Levchenko
541-554

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/